[vc_row][vc_column][vc_column_text]Last night, as I was putting my kids to bed, I read them the classic children’s story, “The Three Little Pigs”. And you know what it got me thinking about—cybersecurity. Probably everyone in the audience is familiar with the tale,...
IT security
Ohio Data Protection Act Just Passed. What Does It Mean for You?
[vc_row][vc_column][vc_column_text] Ohio legislatures just passed the Ohio Data Protection Act, which gives companies a safe harbor in the case of a data breach. Companies that adhere to the NIST Cybersecurity Framework will be entitled to an affirmative defense to...
Is BYOD a Threat to Your I.T. Security?
[vc_row][vc_column][vc_column_text]Bring Your Own Device (BYOD) is jokingly referred to in some IT circles as “Bring Your Own Disaster”. While it offers a great opportunity to reduce costs and make employees happy, it’s still crucial to protect your organization’s...
Holiday Travel Tip for Workers on the Go: Protect Your Data
[vc_row][vc_column][vc_column_text] Whether you're traveling for business or pleasure, it's likely you're logging in for work while on the move. Whether it's on your smartphone or laptop, you need to be extra cautious with your internet access during the holidays....
Hackers Build Backdoor into CCleaner App
[vc_row][vc_column][vc_column_text]A new hack has been announced and it's affecting over 2 million users. The infected application is called CCleaner and it's one that even we have mentioned in the past because it's free and works well to run file clean up to remove...
Data Security Warning: Hurricanes Bring Out the Scammers
[vc_row][vc_column][vc_column_text] In the wake of Hurricane Harvey, and with the predictions for Irma, we want to remind our readers to keep vigilant about protecting their data. Hackers use the confusion and swell of donation requests as a window of opportunity to...
6 Biggest Concerns of IT Experts Today
[vc_row][vc_column][vc_column_text]Security is one of the biggest issues IT professionals deal with. Regardless of how perfectly constructed your network architecture is, if your security is weak, it's all for naught. With all of the headlines about ransomware and...
Invasion of the IoT: Your Kid’s Toys Can Spy On You
[vc_row][vc_column][vc_column_text]The Internet of Things is intended to make life easier by getting all of our devices interacting and working as a team. Our devices even collect data to learn our preferences so they can better suit our needs. It's a wonderful,...
Move Over Ransomware, Wiperware Is Coming to Town
[vc_row][vc_column][vc_column_text]We've talked a lot about ransomware this year. The WannaCry attack was certainly the most notable, recently. Ransomware is a nasty piece of code that takes your system hostage until you pay the hacker whatever they demand. Then, most...
5 Principles of Protection for Your SMB
Small to Mid-Sized Businesses (SMBs) are natural targets for the criminally minded. SMBs have limited resources and are more likely to have gaps in their security because there just aren't enough funds to spread around. The flip side of that issue, though, is that...